IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Sophos Endpoint Security and Data Protection 9.7 review

Sophos' latest Endpoint Security and Data Protection suite provides a wealth of features for protecting workstation and mobile data. It looks very good value, but managing it all may not be so simple. Dave Mitchell finds out if Sophos has gone a step too far.

For anti-virus policies, you can decide how infected files are handled, create schedules for full systems scans and set up email alerts. Live protection can be enabled so if ESDP can't identify a suspicious file from the local signature files it'll pop online and check it against Sophos' hosted database service.

ESDP had no problems when we introduced some genuine viruses to our endpoints as these were blocked and placed in a local quarantine area. The agent notified the console each time which then flagged up a virus alert within a few seconds.

Application control policies are as easy to use and Sophos includes a heap of predefined applications which is just as well as you can't add your own. We were able to block access to utilities such as FTP clients, email apps including Windows Mail and Outlook Express and various browsers, although for Microsoft Office you can only block the entire suite.

Policies are used for each ESDP component and allow you to control the anti-virus scanner, application usage and access to re

Policies are used for each ESDP component and allow you to control the anti-virus scanner, application usage and access to removable storage.

ESDP's device control isn't a patch on DeviceLock as it can only control access to floppy, optical and USB removable storage plus modems, wireless and Bluetooth devices. However, you can passively monitor and log usage on each endpoint, block access entirely or allow read-only or full access. With a policy set to block all usage we inserted USB sticks on some of our endpoints and received pop up warnings advising us that access wasn't permitted.

Data control policies allow you to apply file matching rules to stop them being copied or emailed. File contents can also be checked for keywords, phrases and patterns and Sophos provides a huge predefined list of patterns which includes those required for compliancy with HIPAA, PCI-DSS and PII standards.

Featured Resources

Big data for finance

How to leverage big data analytics and AI in the finance sector

Free Download

Ten critical factors for cloud analytics success

Cloud-native, intelligent, and automated data management strategies to accelerate time to value and ROI

Free Download

Remove barriers and reconnect with your customers

The $260 billion dollar friction problem businesses don't know they have

Free Download

The future of work is already here. Now’s the time to secure it.

Robust security to protect and enable your business

Free Download

Recommended

How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

27 Sep 2022
Armari Magnetar M64TP-RW2000G3 review: Don’t call it a comeback
Hardware

Armari Magnetar M64TP-RW2000G3 review: Don’t call it a comeback

12 Sep 2022
Scan 3XS GWP-ME A124C review: An Intel-powered workhorse that holds its own
Hardware

Scan 3XS GWP-ME A124C review: An Intel-powered workhorse that holds its own

23 Aug 2022
Asus ROG Zephyrus M16 (2022) GU603Z review: Huge processing power you can carry with you
Laptops

Asus ROG Zephyrus M16 (2022) GU603Z review: Huge processing power you can carry with you

6 Jul 2022

Most Popular

How to secure your hybrid workforce
Advertisement Feature

How to secure your hybrid workforce

23 Sep 2022
The human brain is far more complex than AI researchers imagine
artificial intelligence (AI)

The human brain is far more complex than AI researchers imagine

17 Sep 2022
Why collaboration is key to digital transformation
Sponsored

Why collaboration is key to digital transformation

13 Sep 2022